MODULE 17 18
MODULE 17 18
Your Name
Date
Prompt: "Imagine someone is trying to find and fix vulnerabilities in their house before a burglar
attacks. How might this relate to cybersecurity?"
Reactive vs. Proactive: Explain the shift from reactive to proactive security.
Detecting Advanced Threats: Highlight the ability of threat hunting to uncover stealthy attacks.
Visual: A diagram showing the kill chain, from initial reconnaissance to impact.
Benefits: Early warning of emerging threats, threat actor insights, and best practices.
Example: Using SIEM logs, threat feeds, and network traffic analysis to detect a targeted attack.
Instructions:
o Develop a threat profile, including the attacker's goals, capabilities, and tactics.
Slide 9: Conclusion
Call to Action: Encourage students to stay curious and explore the evolving landscape of
cybersecurity.
Additional Tips:
Incorporate real-world examples and case studies to make the content more engaging.
Consider incorporating a hands-on lab activity, such as using a threat hunting platform or
analyzing security logs.
By following these guidelines, you can create a dynamic and informative presentation that will captivate
your students' interest in cybersecurity.
1. What is the primary difference between threat hunting and penetration testing?
o a) Log analysis
o b) Microsoft Office
o c) Google Docs
o d) Adobe Acrobat
7. What is the primary goal of threat hunting?
8. How can threat hunting help organizations improve their security posture?